Aerosol Posted March 11, 2015 Report Posted March 11, 2015 Threat Level: HighSeverity: HighCVSS Severity score: 7.0Impact: Complete Integrity, Confidentiality, and Availability violation.EBay Reference: #EIBBP-31480Vulnerability:(1) Unauthenticated Cross-Site Scripting Vulnerability(1) Filtration BypassVendor Overview“eBay Inc. is an American multinational corporation and e-commerce company, providing consumer toconsumer & business to consumer sales services via Internet. It is headquartered in San Jose, California, UnitedStates. The company manages eBay.com, an online auction and shopping website in which people andbusinesses buy and sell a broad variety of goods and services worldwide. In addition to its auction-style sales,the website has since expanded to include "Buy It Now" shopping; shopping by UPC, ISBN, or other kind ofSKU (via Half.com); online classified advertisements (via Kijiji or eBay Classifieds); online event tickettrading (via StubHub); online money transfers (via PayPal) and other services. eBay was founded by PierreOmidyar in 1995, and became a notable success story of the dot-com bubble; it is a multi-billion dollar businesswith operations localized in over thirty countries.” [1] [2]DescriptionApplication data utilizes in its output, user input that is not validated or properly encoded.The application is vulnerable to an unauthenticated Cross-Site Scripting attack.Vulnerabilities that permit these attacks, are widespread and persist anywhere a web application makes use ofuser input without any security validation controls.A malicious adversary can use this to compromise the trust of unsuspecting users, by tricking them into visitinga seemingly benign and trusted site. The malicious payload is embedded within a seemingly benign URL.This way an attacker can steal user credentials, to hijack a user’s session, to force a redirection to aheterogeneous third-party website, and thus to force a user’s browser to execute unsafe actions on behalf of theattacker. [3] [4]In this attack scenario it is noted that “Visitor -> Vendor” trust-levels are directly impacted. Read more: http://dl.packetstormsecurity.net/1503-exploits/eBay030315.pdf Quote